[ { "id": 255764753, "name": "CVE-2020-3952", "full_name": "commandermoon\/CVE-2020-3952", "owner": { "login": "commandermoon", "id": 46551775, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46551775?v=4", "html_url": "https:\/\/github.com\/commandermoon" }, "html_url": "https:\/\/github.com\/commandermoon\/CVE-2020-3952", "description": "Vuln Check", "fork": false, "created_at": "2020-04-15T00:51:21Z", "updated_at": "2021-12-05T21:34:44Z", "pushed_at": "2020-04-15T22:23:57Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 256080140, "name": "CVE-2020-3952", "full_name": "avboy1337\/CVE-2020-3952", "owner": { "login": "avboy1337", "id": 5463104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4", "html_url": "https:\/\/github.com\/avboy1337" }, "html_url": "https:\/\/github.com\/avboy1337\/CVE-2020-3952", "description": "Working Exploit PoC for VMWare vCenter Server (CVE-2020-3952) - Reverse Bind Shell", "fork": false, "created_at": "2020-04-16T01:39:33Z", "updated_at": "2021-12-05T21:34:44Z", "pushed_at": "2020-04-15T00:13:59Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 5, "score": 0 }, { "id": 256143992, "name": "vmware_vcenter_cve_2020_3952", "full_name": "guardicore\/vmware_vcenter_cve_2020_3952", "owner": { "login": "guardicore", "id": 5675395, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5675395?v=4", "html_url": "https:\/\/github.com\/guardicore" }, "html_url": "https:\/\/github.com\/guardicore\/vmware_vcenter_cve_2020_3952", "description": "Exploit for CVE-2020-3952 in vCenter 6.7", "fork": false, "created_at": "2020-04-16T07:40:51Z", "updated_at": "2021-12-16T23:36:27Z", "pushed_at": "2020-04-16T08:38:42Z", "stargazers_count": 254, "watchers_count": 254, "forks_count": 60, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 60, "watchers": 254, "score": 0 }, { "id": 256499271, "name": "CVE-2020-3952", "full_name": "gelim\/CVE-2020-3952", "owner": { "login": "gelim", "id": 179122, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179122?v=4", "html_url": "https:\/\/github.com\/gelim" }, "html_url": "https:\/\/github.com\/gelim\/CVE-2020-3952", "description": "VMWare vmdir missing access control exploit checker", "fork": false, "created_at": "2020-04-17T12:39:31Z", "updated_at": "2021-12-05T21:34:44Z", "pushed_at": "2020-04-17T17:09:06Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 257074392, "name": "vmware_vcenter_cve_2020_3952", "full_name": "Fa1c0n35\/vmware_vcenter_cve_2020_3952", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/vmware_vcenter_cve_2020_3952", "description": "Exploit for CVE-2020-3952 in vCenter 6.7 https:\/\/www.guardicore.com\/2020\/04\/pwning-vmware-vcenter-cve-2020-3952\/", "fork": false, "created_at": "2020-04-19T18:35:13Z", "updated_at": "2021-12-05T21:34:44Z", "pushed_at": "2020-04-19T18:35:22Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 } ]